A system for yielding control of a network to a device configured to operate on a pstn. The system includes a network configured to couple one or more devices to a pstn, and a pstn telephone, a pstn security system, and an ata and modem coupled to the network. The ata and modem are configured to provide a voip interface between the network and the Internet and to provide a dial tone to the network. An access detector is coupled to the network to detect when the security system attempts to use the network.
|
15. A method of seizing control of a network configured to interface with a pstn, the method comprising:
transmitting, by a first device, a sequence of dtmf signals over the network;
detecting the sequence of dtmf signals;
disconnecting a second device from the network when the detected sequence of dtmf signals matches a predetermined sequence of dtmf signals; and
communicating, by the first device, over the network following the disconnecting of the second device from the network.
1. A system for yielding control of a network to a device configured to operate on a pstn, the system comprising:
a network configured to couple one or more devices to the pstn;
a first device coupled to the network and configured to operate on the pstn;
a second device coupled to the network and configured to operate on the pstn;
a third device coupled to the network, configured to provide a voip interface between the network and the Internet and to provide a dial tone to the network; and
a fourth device coupled between the network and the third device, and configured to detect when the second device attempts to use the network during a time when the first device is using the network.
22. A system for yielding control of a network to a device configured to operate on a pstn, the system comprising:
a network configured to couple one or more devices to a pstn;
a telephone coupled to the network and configured to operate on the pstn;
a security system coupled to the network and configured to operate on the pstn;
an access detector coupled to the network and configured to detect when the security system attempts to use the network during a time when the telephone is using the network; and
an ata and modem coupled to the network via the access detector and configured to provide a voip interface between the network and the Internet and to provide a dial tone to the network.
19. A voip security system, comprising:
a network comprising a first wire and a second wire;
a security system configured to operate on a pstn, the security system coupled to the first wire and the second wire;
a pstn telephone coupled to the first wire and the second wire and configured to operate on the pstn;
a voip interface device coupled to the first wire and the second wire, configured to provide a voip interface between the network and the Internet and to provide a dial tone to the network;
a detector coupled to the first and the second wire, configured to detect when the security system attempts to access the network and send a signal indicating that the security system is attempting to access the network during a time when the pstn telephone is using the network; and
a device coupled to the first and the second wire, configured to disconnect the pstn telephone from at least one of the first wire and the second wire based on the signal.
2. The system of
3. The system of
4. The system of
5. The system of
6. The system of
7. The system of
9. The system of
10. The system of
11. The system of
13. The system of
14. The system of
16. The method of
17. The method of
18. The method of
20. The voip security system of
21. The voip security system of
|
Many building fire and/or security systems (hereinafter referred to simply as security systems) are configured to contact emergency personnel (e.g., police, fire fighters, security officers, etc.) to report an abnormal or alarm event (e.g., a fire, a break-in, etc.) at a building. While some security systems are configured to contact the emergency personnel via a wireless or cellular interface, the majority use a public switched telephone network (PSTN), also known as a plain old telephone system (POTS), to contact emergency personnel. The security systems generally connect to a building's internal telephone network, and when a fire, break-in, or similar event occurs, the security system takes control of the PSTN, disconnecting all other devices connected to the PSTN. For example, if a user is using a telephone line (e.g., sending a fax, making a telephone call, etc.), the security system disconnects the internal telephone network, including the user, from the PSTN and takes control of the system to make its call.
A PSTN security system 120, used in the building 100 having the VoIP telephone system 200, is disconnected from the building's telephone network 105 (as illustrated by the “X”), but remains connected to the PSTN 115 through the interface 116. Therefore, devices 110 in the building, use the VoIP interface 220 to communicate over the Internet 215, while the security system uses the PSTN 115. This results in increased costs as a connection to the PSTN 115 must be maintained for the security system 120. As a consequence, what is needed is a system where a security system can gain control of a premises' telephone network when necessary to make a telephone call over a VoIP system.
In one embodiment, the invention provides a system for yielding control of a network to a device configured to operate on a PSTN. The system includes a network configured to couple one or more devices to a PSTN, and a first device (e.g., a telephone), a second device (e.g., a security system), a third device (e.g., an ATA and a modem), and a fourth device (e.g., an access detector) coupled to the network. The first and second devices are configured to operate on the PSTN. The third device is configured to provide a VoIP interface between the network and the Internet and to provide a dial tone to the network. The fourth device is configured to detect when the second device attempts to use the network.
In another embodiment the invention provides a method of seizing control of a network configured to interface with a PSTN. The method includes the acts of transmitting, by a first device, a sequence of DTMF signals over the network, detecting the sequence of DTMF signals, disconnecting a second device from the network when the detected sequence of DTMF signals matches a predetermined sequence of DTMF signals, and communicating, by the first device, over the network following disconnecting the second device from the network.
In another embodiment the invention provides a VoIP security system including a network having a first wire and a second wire, and a security system, a PSTN telephone, and a VoIP interface coupled to the first wire and the second wire. The security system is configured to operate on a PSTN. The system also includes a device configured to disconnect the PSTN telephone from at least one of the first wire and the second wire based on a signal which indicates that the security system is accessing the network.
In another embodiment the invention provides a system for yielding control of a network to a device configured to operate on a PSTN. The system includes a network configured to couple one or more devices to a PSTN, and a telephone, a security system, an ATA and modem, and an access detector coupled to the network. The telephone and security system are configured to operate on the PSTN. The ATA and modem are configured to provide a VoIP interface between the network and the Internet and to provide a dial tone to the network. The access detector is configured to detect when the security system attempts to use the network.
Other aspects of the invention will become apparent by consideration of the detailed description and accompanying drawings.
Before any embodiments of the invention are explained in detail, it is to be understood that the invention is not limited in its application to the details of construction and the arrangement of components set forth in the following description or illustrated in the following drawings. The invention is capable of other embodiments and of being practiced or of being carried out in various ways.
If, at step 320, a connection is not completed in a predetermined time period, the security system 120 disconnects the security system 120 from the telephone network 105 (e.g., initiates an “on-hook” condition) (step 324), pauses or waits for a period of time to allow the telephone network 105 and ATA 205 to reset (step 326) and repeats the process beginning at step 312.
If, at step 314, another device 110 is using the telephone network 105, the ATA 205 does not generate a dial tone. The security system 120, upon not receiving the dial tone in response to its “off-hook” condition, sends a predetermined sequence of DTMF signals (step 328) to indicate that the security system 120 desires to access the telephone network 105. The access detector 310 detects the sequence of DTMF signals (step 330), and causes the devices 110 to disconnect from the telephone network 105 as described below. The security system 120 then initiates an “on-hook” condition (step 324), delays or waits (step 326), and repeats the process at step 312, at which time the device(s) 110 using the telephone network 105 are disconnected and the security system 120 receives a dial tone at step 314.
The security system 120 waits (step 338) for a connection to be made to the remote location, whether or not another device was using the telephone network 105. If the connection is made (step 340), the security system 120 sends data relating to the event to the remote location (step 342).
If, at step 340, a connection is not completed in a predetermined time period, either because the telephone network 105 is being used by another device 110 or some other reason, the security system 120 initiates an “on-hook” condition (step 344), waits for a period of time to allow the telephone network 105 and ATA 205 to reset (step 346) and repeats the process beginning at step 332, at which time if another device 110 was using the telephone network 105, it is disconnected and the security system's call is completed.
In the construction shown in
If the access detector 310 detects that the security system 120 is attempting to access the telephone network 105 while another device 110 (e.g., the telephone) is using the telephone network 105, the access detector 310 sends a disconnect signal to the seizure devices 305 directing the seizure devices 305 to disconnect their respective devices 110 from the telephone network 105. In some embodiments, the access detector 310 sends the disconnect signal continuously until the security system 120 is no longer using the telephone network 105. In other embodiments, the access detector 310 sends the disconnect signal for a period of time (e.g., until the security system 120 has connected to the remote location). The seizure device 305, upon receiving the disconnect signal, disconnects the device 110 from the telephone network 105. In some embodiments, the seizure device 305 automatically reconnects the device 110 to the telephone network 105 at the expiration of a period of time. If the security system 120 is still using the telephone network 105, the device 110 is unable to receive a dial tone, and, therefore, use the telephone network 105 until the security system 120 is no longer using the telephone network 105. In other embodiments, the access detector 310 sends a reconnect signal when the access detector 310 detects that the security system 120 is no longer using the telephone network 105. In these embodiments, the seizure device 305 keeps the device 110 disconnected until the seizure device 305 receives the reconnect signal.
In one construction, schematically shown in
In the construction shown, the device 110 connects to the seizure device 305 by a cable 390 (the cable 390 can be integrated into the device 110 or a separate, stand alone, cable that plugs into the device 110). The cable 390 includes a male RJ11 connector or plug 395 that is plugged into the second RJ11 jack 370. A standard telephone cable 400 (e.g., having two RJ11 plugs 405 and 410) is used to connect the seizure device 305 to an RJ11 jack 415 that is connected to the telephone network 105. Alternatively, the seizure device 305 can have an integrated cable including a RJ11 plug 410 for connecting to the telephone network 105.
When the controller 375 detects the disconnect signal on its first line 380, the controller 375 provides a signal on line 385 to open the switch 350. As discussed above, the controller 375 can provide the signal to open the switch 350 continuously, as long as the controller 350 receives the disconnect signal from the access detector 310 or, in other embodiments, can provide the signal to open the switch 350 for a predetermined time period or until a reconnect signal is received from the access detector 310.
In an alternate embodiment, each seizure device 305 includes the access detector 310, and detects when the security system 120 is attempting to access the telephone network 105. The seizure device 305 then disconnects from the telephone network 105 as described above. In some embodiments, the security system 120 includes and/or operates as the access detector 310, sending the disconnect signal (e.g., wired or wirelessly) to the seizure device 305 to disconnect the devices 110 from the telephone network 105 as described above.
In some embodiments, one or more of the devices 110 connected to the telephone network 105 incorporate the seizure device 305 and/or the access detector 310. In other embodiments, the access detector 310 is incorporated in the ATA 205.
Various features and advantages of the invention are set forth in the following claims.
Petricoin, Jr., Dennis Michael
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
5018190, | Sep 21 1989 | Hewlett-Packard Company | Device to block unauthorized modem access over a PBX line |
6067346, | Dec 18 1998 | WSOU Investments, LLC | Method and system for providing redundancy in security systems served by a public switched telephone network |
6141341, | Sep 09 1998 | Google Technology Holdings LLC | Voice over internet protocol telephone system and method |
6584108, | Sep 30 1998 | Cisco Technology, Inc | Method and apparatus for dynamic allocation of multiple signal processing resources among multiple channels in voice over packet-data-network systems (VOPS) |
6801540, | Aug 04 2000 | LG Electronics Inc. | Internet phone-based private exchange and call signal exchanging method thereof |
6850601, | May 22 2002 | BELKIN INTERNATIONAL, INC | Condition detection and notification systems and methods |
7085551, | Apr 08 2003 | CINGULAR WIRELESS II, INC | Systems and methods for providing non-dedicated wireless backup service for monitored security systems |
7391762, | Oct 13 2001 | Samsung Electronics Co., Ltd. | Call processing message converter and message converting method in internet protocol telephony exchange system |
7853199, | Jul 10 2007 | ADEMCO INC | Alarm signaling with hybrid data and two-way voice channel |
8199743, | Nov 29 2005 | RPX CLEARINGHOUSE LLC | Enhanced services for a pots line |
8228907, | Sep 29 2006 | Method and system for providing VOIP services | |
8451986, | Apr 23 2007 | ICONTROL NETWORKS, INC | Method and system for automatically providing alternate network access for telecommunications |
9049307, | Oct 17 2008 | Honeywell International Inc. | Wireless interface device allowing a reliable digital and audio communication transfer between a security system, POTS and/or IP network modem device |
20040086093, | |||
20050041642, | |||
20060007915, | |||
20060067484, | |||
20060209857, | |||
20060239250, | |||
20060239418, | |||
20070001818, | |||
20070211877, | |||
20080020648, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Jul 07 2008 | Robert Bosch GmbH | (assignment on the face of the patent) | / | |||
Jul 07 2008 | PETRICOIN, DENNIS MICHAEL, JR | BOSCH SECURITY SYSTEMS, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 021200 | /0919 | |
Jul 07 2008 | PETRICOIN, DENNIS MICHAEL, JR | Robert Bosch GmbH | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 021200 | /0919 |
Date | Maintenance Fee Events |
Sep 24 2020 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Date | Maintenance Schedule |
Apr 11 2020 | 4 years fee payment window open |
Oct 11 2020 | 6 months grace period start (w surcharge) |
Apr 11 2021 | patent expiry (for year 4) |
Apr 11 2023 | 2 years to revive unintentionally abandoned end. (for year 4) |
Apr 11 2024 | 8 years fee payment window open |
Oct 11 2024 | 6 months grace period start (w surcharge) |
Apr 11 2025 | patent expiry (for year 8) |
Apr 11 2027 | 2 years to revive unintentionally abandoned end. (for year 8) |
Apr 11 2028 | 12 years fee payment window open |
Oct 11 2028 | 6 months grace period start (w surcharge) |
Apr 11 2029 | patent expiry (for year 12) |
Apr 11 2031 | 2 years to revive unintentionally abandoned end. (for year 12) |